Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
31
views
8
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,821
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Conceptual Modeling - ER 2006
Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages
other
Author(s):
Marie Farrell
,
Matthew Bradbury
,
Michael Fisher
,
Louise A. Dennis
,
Clare Dixon
,
Hu Yuan
,
Carsten Maple
Publication date
(Online):
September 09 2019
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Journal of Paleontological Techniques
Most cited references
8
Record
: found
Abstract
: not found
Book Chapter
: not found
Z3: An Efficient SMT Solver
Leonardo de Moura
,
Nikolaj Bjørner
(2008)
0
comments
Cited
131
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Boogie: A Modular Reusable Verifier for Object-Oriented Programs
Mike Barnett
,
Bor-Yuh Chang
,
Robert DeLine
…
(2006)
0
comments
Cited
73
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
A calculus of refinements for program derivations
R. J. R. Back
(1988)
0
comments
Cited
36
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2019
Publication date (Online):
September 09 2019
Pages
: 471-490
DOI:
10.1007/978-3-030-30446-1_25
SO-VID:
e8027caa-b5f0-4723-9e34-954e12d51205
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
JAC: A Flexible Solution for Aspect-Oriented Programming in Java
pp. 1
The Torii of Phases
pp. 61
Analysis of Realizability Conditions for Web Service Choreographies
pp. 94
Loose Programming with PROPHETS
pp. 16
ITUbee: A Software Oriented Lightweight Block Cipher
pp. 21
A Non-parametric Statistical Shape Model for Assessment of the Surgically Repaired Aortic Arch in Coarctation of the Aorta: How Normal is Abnormal?
pp. 77
Evaluating User Experience in a Selection Based Brain-Computer Interface Game A Comparative Study
pp. 84
Public Evidence from Secret Ballots
pp. 99
Microsoft Hololens - A mHealth Solution for Medication Adherence
pp. 118
A Model for the Structural, Functional, and Deontic Specification of Organizations in Multiagent Systems
pp. 165
Recognizing Biomedical Named Entities Based on the Sentence Vector/Twin Word Embeddings Conditioned Bidirectional LSTM
pp. 174
Bio-inspired Stereo Vision System with Silicon Retina Imagers
pp. 195
Towards a Taxonomy of Decision Making Problems in Multi-Agent Systems
pp. 248
Object Teams: Improving Modularity for Crosscutting Collaborations
pp. 261
Mizar: State-of-the-art and Beyond
pp. 297
Towards Improved Detection of Cognitive Performance Using Bidirectional Multilayer Long-Short Term Memory Neural Network
pp. 302
Approximation Algorithms for Multi-criteria Traveling Salesman Problems
pp. 342
Policy Management and Enforcement Using OWL and SWRL for the Internet of Things
pp. 362
A BP Neural Network Predictor Model for Stock Price
pp. 390
The Second International Graphics Recognition Contest — Raster to vector conversion: A report
pp. 404
Scientific Matchmaker: Collaborator Recommender System
pp. 411
Convex Hull in Feature Space for Support Vector Machines
pp. 420
Design and Implementation of Bézier Curve Trajectory Planning in DELTA Parallel Robots
pp. 471
Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages
pp. 482
Towards a Reference Ontology for Business Models
pp. 497
Reasoning on UML Class Diagrams with OCL Constraints
pp. 707
Using Probabilistic Latent Semantic Analysis for Personalized Web Search
pp. 733
Policy Gradient Method for Team Markov Games
Similar content
1,821
A generic, formal language-based methodology for hierarchical floorplanning-placement
Authors:
Nikolaos Bourbakis
Hierarchical Verification in Maude of LfP Software Architectures
Authors:
Chadlia Jerad
,
Kamel Barkaoui
,
Amel Grissa Touzi
Mobile phone messaging for illicit drug and alcohol dependence: A systematic review of the literature.
Authors:
Babak Tofighi
,
Joseph Nicholson
,
Jennifer McNeely
…
See all similar
Cited by
2
Towards an extensive set of criteria for safety and cyber-security evaluation of cyber-physical systems
Authors:
Aleš Smrčka
,
Behrooz Sangchoolie
,
Emanuele Mingozzi
…
Formal Modelling and Runtime Verification of Autonomous Grasping for Active Debris Removal
Authors:
Marie Farrell
,
Nikos Mavrakis
,
Angelo Ferrando
…
See all cited by